Sciweavers

CCS
2015
ACM
8 years 1 months ago
AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications
A privacy policy is a statement informing users how their information will be collected, used, and disclosed. Failing to provide a correct privacy policy may result in a fine. Ho...
Le Yu, Tao Zhang, Xiapu Luo, Lei Xue
CCS
2015
ACM
8 years 1 months ago
CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services
Anonymity networks such as Tor are a critical privacy-enabling technology. Tor’s hidden services provide both client and server anonymity. They protect the location of the serve...
Srdjan Matic, Platon Kotzias, Juan Caballero
CCS
2015
ACM
8 years 1 months ago
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks
A general prerequisite for a code reuse attack is that the attacker needs to locate code gadgets that perform the desired operations and then direct the control flow of a vulnerab...
Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P...
CCS
2015
ACM
8 years 1 months ago
(Un)linkable Pseudonyms for Governmental Databases
When data maintained in a decentralized fashion needs to be synchronized or exchanged between different databases, related data sets usually get associated with a unique identi...
Jan Camenisch, Anja Lehmann
CCS
2015
ACM
8 years 1 months ago
A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System
The HIVE hidden volume encryption system was proposed by Blass et al. at ACM-CCS 2014. Even though HIVE has a security proof, this paper demonstrates an attack on its implementatio...
Kenneth G. Paterson, Mario Strefler
CCS
2015
ACM
8 years 1 months ago
Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext
In this paper we present an identity-set-based broadcast encryption scheme with three working modes: set membership (Include-mode), all member (All-mode), and negative membership ...
Yan Zhu, Xin Wang, Di Ma, Ruiqi Guo
CCS
2015
ACM
8 years 1 months ago
Insecurity of Voice Solution VoLTE in LTE Mobile Networks
VoLTE (Voice-over-LTE) is the designated voice solution to the LTE mobile network, and its worldwide deployment is underway. It reshapes call services from the traditional circuit...
Chi-Yu Li, Guan-Hua Tu, Chunyi Peng, Zengwen Yuan,...
CCS
2015
ACM
8 years 1 months ago
Authorization Federation in IaaS Multi Cloud
As more and more organizations move to cloud, it is inevitable that cross-organizational collaboration will need to be supported in the cloud. In this paper, we explore models for...
Navid Pustchi, Ram Krishnan, Ravi S. Sandhu
CCS
2015
ACM
8 years 1 months ago
GRECS: Graph Encryption for Approximate Shortest Distance Queries
We propose graph encryption schemes that efficiently support approximate shortest distance queries on large-scale encrypted graphs. Shortest distance queries are one of the most f...
Xianrui Meng, Seny Kamara, Kobbi Nissim, George Ko...
CCS
2015
ACM
8 years 1 months ago
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
Benjamin Dowling, Marc Fischlin, Felix Günthe...